#Security gaps are closed in programs through ... ..
Problems / weaknesses passed in the program
الصف / الحاسب الآلي – المتوسط الثاني – الفصل الأول
Computer and internet sessions / network.
Data Security Mechanism:
Contents
Countries and companies are competing to provide security to exchange data on the Internet, and have paid a heavy price for that.If the protection capacity is strong, it is difficult to attack data.The most important mechanisms used in data security are the following:
1- Data encryption: This means that through a lot of tools or programs that provide encryption services, the data sent on the network is transferred to information that only the sender and the future understands.
2- The Wall of the Protection: It is a program that controls the process of communication between the computer and the network, and prevents malicious programs and infiltrators from accessing the computer by displaying data and then allowing them or blocking it.
3- Backup: Users may need to prepare and collect important files for many years, and it is important to keep backup copies of files and return them in the event that they are lost for any reason.
4- Automatic update: The security vulnerabilities are constantly discovered in programs and operating systems, it is important to fill these gaps before they are exploited by the attackers, and the way they are bridged is to update these programs, and it is good to activate the automatic update function, so Connect to the update will be downloaded immediatelyAfter the Internet.
Read also: He who wishes the blessings of the blessings of others is
Programs are closed in the following ways:
The following is the correct answer to the problem of eliminating the security gaps of the program in the specialty of computer in the second year of the first semester. The question is a multi -options question. The options are as follows:
Read also: Shams Badran CV Wikipedia Who is he?
- تشفير البيانات
- جدار الحماية
- دعم
- تحديث اتوماتيكيا.
The correct answer: (automatically updated).